With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ...
详细信息
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
详细信息
This paper studies the relationship prediction problem in multi-network scenarios, aiming to overcome the network sparsity challenge where the labeled data (connected node pairs) are much less than the unlabeled data ...
详细信息
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ...
详细信息
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time *** every time period,a time stamp authority generates a public key embedded with the current time stamp for each *** our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and *** TIPRE scheme allows the landlord to change the lock key at each time period for *** blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and ***,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms.
Computer security is very important since three decades ago, which becomes quite challenging especially in the wireless access scenarios. In this paper, we summarize the technologies of the development over the comput...
详细信息
Both the power and the information are transmitted wirelessly, respectively, in downlink and uplink traffics for spatial-division multiple access networks. The receiver in uplink is equipped with multiple antennas to ...
详细信息
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa...
详细信息
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu...
详细信息
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the res...
详细信息
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the rest of the consensus algorithms,and it does not cause problems such as the concentrated hashing power,resource waste and ***,Raft can only be used in a non-byzantine environment with a small network *** order to enable Raft to be used in a large-scale network with a certain number of byzantine nodes,this paper combines Raft and credit model to propose a Raft blockchain consensus algorithm based on credit model *** the node credit evaluation phase,RBF-based support vector machine is used as the anomaly detection method,and the node credit evaluation model is *** the Trust Nodes List(TNL)mechanism is introduced to make the consensus phase in a creditable network ***,the common node is synchronized to the consensus node to update the blockchain of the entire *** show that CRaft has better throughput and lower latency than the commonly used consortium blockchain consensus algorithm PBFT(Practical Byzantine Fault Tolerance).
Effective workload forecasting can provide a reference for resource scheduling in cloud data centers. Compared with the normal single data center, the multi-data center has a more complicated architecture design and p...
详细信息
暂无评论